Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 616740 Details for
Bug 849223
RHEL5 Xen SR-IOV VF PCI passthru does not work to RHEL6 HVM guest; no interrupts received on the guest VF
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
rhel58 x64 xen hvm guest ixgbevf_msix_clean_tx crash log stack trace
rhel58-x64-xen-hvm-guest-vf-ixgbevf-msix-clean-tx-crash-log.txt (text/plain), 3.04 KB, created by
Pasi Karkkainen
on 2012-09-24 21:39:45 UTC
(
hide
)
Description:
rhel58 x64 xen hvm guest ixgbevf_msix_clean_tx crash log stack trace
Filename:
MIME Type:
Creator:
Pasi Karkkainen
Created:
2012-09-24 21:39:45 UTC
Size:
3.04 KB
patch
obsolete
>Unable to handle kernel paging request at ffff810078626d5e RIP: > [<ffffffff88210e5f>] :ixgbevf:ixgbevf_msix_clean_tx+0x58/0x2a2 >PGD 10063 PUD 0 >Oops: 0000 [1] SMP >last sysfs file: /block/ram0/dev >CPU 0 >Modules linked in: ipv6 xfrm_nalgo crypto_api dm_multipath scsi_dh video backlight sbs power_meter hwmon i2c_ec dell_wmi wmi button battery asus_acpi acpi_memhotplug ac parport_pc lp parport floppy xen_vnif joydev xen_vbd xen_balloon pcspkr i2c_piix4 i2c_core e1000 ixgbevf serio_raw ide_cd cdrom 8021q tpm_tis tpm xen_platform_pci tpm_bios dm_raid45 dm_message dm_region_hash dm_mem_cache dm_snapshot dm_zero dm_mirror dm_log dm_mod ata_piix libata sd_mod scsi_mod ext3 jbd uhci_hcd ohci_hcd ehci_hcd >Pid: 1800, comm: ifconfig Not tainted 2.6.18-308.13.1.el5 #1 >RIP: 0010:[<ffffffff88210e5f>] [<ffffffff88210e5f>] :ixgbevf:ixgbevf_msix_clean_tx+0x58/0x2a2 >RSP: 0018:ffffffff804b1ec8 EFLAGS: 00010286 >RAX: 0000000000000000 RBX: ffff810078626d3a RCX: 0000000000000000 >RDX: ffff81003d517b80 RSI: 0000000000000040 RDI: 0000000000000000 >RBP: ffff81003db7ea40 R08: ffffffff80323028 R09: 0000000000000046 >R10: 0000000000000001 R11: ffffffff8820e113 R12: ffff810037f49500 >R13: 0000000000000000 R14: ffff810035019c38 R15: ffff810035019c38 >FS: 00002b0102cda5e0(0000) GS:ffffffff80431000(0000) knlGS:0000000000000000 >CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >CR2: ffff810078626d5e CR3: 0000000038307000 CR4: 00000000000006a0 >Process ifconfig (pid: 1800, threadinfo ffff810035018000, task ffff81003d8730c0) >Stack: ffff81003d517b80 0000000000000000 0000000000000046 ffffffff80566f00 > ffffffff80448f90 0000000000000000 ffff81003db7ea40 00000000000000c9 > 0000000000000000 ffff810035019c38 ffff810035019c38 ffffffff80010d91 >Call Trace: > <IRQ> [<ffffffff80010d91>] handle_IRQ_event+0x51/0xa6 > [<ffffffff800be15f>] __do_IRQ+0xfb/0x15b > [<ffffffff8006d4d1>] do_IRQ+0xe9/0xf7 > [<ffffffff8005d615>] ret_from_intr+0x0/0xa > <EOI> [<ffffffff8820e113>] :ixgbevf:ixgbevf_set_vfta_vf+0x0/0x2e > [<ffffffff8820e3b8>] :ixgbevf:ixgbevf_read_v2p_mailbox+0x10/0x23 > [<ffffffff8820e46c>] :ixgbevf:ixgbevf_obtain_mbx_lock_vf+0x13/0x1f > [<ffffffff8820e5ef>] :ixgbevf:ixgbevf_write_mbx_vf+0x14/0x79 > [<ffffffff8820e52f>] :ixgbevf:ixgbevf_write_posted_mbx+0x17/0x5c > [<ffffffff8820e13c>] :ixgbevf:ixgbevf_set_vfta_vf+0x29/0x2e > [<ffffffff881cb35a>] :8021q:vlan_device_event+0x50/0x1b2 > [<ffffffff800675cb>] notifier_call_chain+0x20/0x32 > [<ffffffff8023a75f>] dev_open+0x96/0x9c > [<ffffffff80238854>] dev_change_flags+0x5a/0x119 > [<ffffffff8026d035>] devinet_ioctl+0x235/0x59c > [<ffffffff8022f748>] sock_ioctl+0x1c1/0x1e5 > [<ffffffff80041f7f>] do_ioctl+0x21/0x6b > [<ffffffff8002ffcb>] vfs_ioctl+0x457/0x4b9 > [<ffffffff800ba76b>] audit_syscall_entry+0x1a8/0x1d3 > [<ffffffff8004c381>] sys_ioctl+0x59/0x78 > [<ffffffff8005d28d>] tracesys+0xd5/0xe0 > > >Code: 8b 6b 24 c7 43 3c 00 00 00 00 c7 43 40 00 00 00 00 4d 8b b4 >RIP [<ffffffff88210e5f>] :ixgbevf:ixgbevf_msix_clean_tx+0x58/0x2a2 > RSP <ffffffff804b1ec8> >CR2: ffff810078626d5e > <0>Kernel panic - not syncing: Fatal exception >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 849223
:
606043
|
606044
|
606045
|
606046
|
606050
|
606051
|
606365
|
606370
|
606639
|
610520
|
611505
|
613668
|
614372
|
614373
|
614374
|
614596
|
615391
|
615392
|
615482
| 616740 |
617217
|
617218
|
617260
|
617261
|
617528
|
617541
|
617718
|
618009
|
618145
|
618240
|
618241
|
618312